Fig. 2. Architecture of the Banking System. C lient E nd. Server End. Server End. Server End. Server End. Graphical User Panel
|
|
- Bernard Burns
- 8 years ago
- Views:
Transcription
1 Distributed Banking with Mobile Agents: An Approach for E-Commerce R.B. PATEL and K. GARG Department of Electronics & Computer Engineering India Institute of Technology Roorkee, Roorkee , Uttaranchal, India Abstract: The anticipated increase in popular use of the Internet has created more opportunity in information dissemination, E-commerce, and multimedia communication. It has also created more challenges in organizing information and facilitating its efficient retrieval. From the network perspective, there are additional challenges and problems in meeting bandwidth requirement, as also in network management. In response to this, new techniques, languages and paradigms have evolved which facilitate the creation of such applications. Certainly the most promising among the new paradigms is the use of mobile agents. In this paper, mobile agent technology, as applied in an E-commerce application, is discussed. We report an implementation of a banking system, whose database may be distributed at different sites on the Internet. A customer can send his/her mobile agent to perform various tasks involved in banking and get back an appropriate result. PMADE is used as the platform to develop these mobile agents. Security checks have been also implemented, as this is an important requirement in E-commerce. Keywords: E-commerce, Mobile Agent, Distributed Database, Agent Host, Agent Submitter and PMADE. 1 Introduction Traditionally, the relationship between Providers and Customers has been specific, contractual, and largely static. The Internet, wireless and digital streaming technologies have opened up the possibilities for Providers to have as many Customers as possible and for Customers to have a choice between Providers. Together, the Internet and the Web, support growth opportunities in selling commodities, customer and service provider relationship, information searching, banking, product/service design, user support, geographic expansion, logistics, and supply chain integration. In this dynamic environment, the traditional challenge of managing a one-to-one relationship is giving way to the much greater challenge of managing many-to-one and one-to-many relationships. A user level application is an e-marketplace where vendors can set up online shops with products, services or information, for sale [1]. A commercial transaction may require real-time access to remote resources such as stock quotes, balance in accounts, current inventory, etc. For such transactions, we envision agents that embody the intentions of their creators and act and negotiate on their behalf. Mobile agent technology [2] is a very appealing solution to this kind of problem. A customer s agent would carry a shopping list along with a set of preferences, visit various sellers, get the best deal based on the preferences and purchase the product using digital forms of cash. Applications that need to monitor events on remote machines, such as, whether a particular bank account s balance has fallen below a threshold, are also benefited from mobile agents, since agents need not use the network for polling. Instead of periodically downloading bank statements, an agent can be sent to quote service to monitor the balance. The agent can inform the user when a specified event occurs. In this paper, we report on the implementation of such a banking system using mobile agent technology [3]. The mobile agent platform used is PMADE, which has been developed at IIT Roorkee itself [4, 5, 6, 7]. We are using PMADE because this platform provides mobility to agents as well as to Hosts both; other reason is that this platform can run in heterogeneous environment. The rest of the paper is organized as follows: Section 2 gives an overview of the Mobile Agent framework used for the development of application, i.e., PMADE. Section 3 discusses the architectural details of the developed banking system Section 4 gives details of the implementation of the system and the mobile agents required for this purpose. Results are discussed in section 5 and Section 6 concludes the paper. 2 Overview of PMADE Fig. 1 illustrates the detailed architecture of PMADE (A Platform for Mobile Agent Distribution and Execution) [5, 6, 7]. The Agent Host is the key component of PMADE. It consists of the manager modules and the Host Driver. The Host Driver is the basic utility module, which lies below the manager modules and is responsible for driving the Agent Host by ensuring proper co-ordination between various managers and making them work in tandem. Various manager modules form an essential part of the Agent Host. The Agent (AM) authenticates the connection with the help of (UM) and Signature (SM), as per the Agent Transfer 1
2 Protocol [4, 6] requirements. If it is able to receive the agent, it passes it to the Cloning (CM). Here, a clone of the mobile agent is created and forwarded to other Agent Hosts, if required, with the help of Address (NAM). The Host Driver summons the Agent Reply (ARM) to formulate the reply and dispatch the same to the Agent Host/Agent Submitter of the respective mobile agent. Agent Host Agents Objects Applications Signature Address Agent Cloning Host Driver Service Bridge Task Agent Submitter Resource Account Broker Agent Reply Persistence Security Agent Receiver Agent to Agent Communication (Message Queue Processor) Fig. 1. Architecture of PMADE The model also provides an in-built resource accounting feature. End-users are required to subscribe, to utilize the services of the base server (parent agent Host-where an agent is first submitted). The Resource Accounting (RAM) does this. Similarly, the Persistence (PM) is provided, so that, in case of system shutdown/breakdown, the agent state can be saved and restored for the sake of security and continuity. Provision has been also made for a Broker (BM) in the model, to facilitate brokering on the Internet. The Security (SM) provides security to Agent Host from malicious Mobile Agents as also to the static data/credential information of a Mobile Agent running on an Agent Host, from other agents running on the same host. A detailed discussion of these managers is beyond the scope of this paper, but can be seen in [4, 6]. 3 Architecture and Design of the Banking System The aspect of E-Commerce [10], on which we focus in this paper, is the payment for procurement of some commodity in any part of the world. These payments are typically done from a single account, but several alternative accounts may exist. The customer (client) dispatches one or more mobile agents, each with its list of required modes of transaction, amount and potential accounts/banks. The mobile agent visits each bank server intern to perform the required transaction. If the desired account is present, it processes the transaction on behalf of the user, else it moves to other bank servers. If the transaction is committed, or the bank list is exhausted, the mobile agent returns to the customer with the details of the operations performed. 3.1 Bank Server This is the central module of the application. All the functionality of the bank resides here. All mobile agents report to this module, which performs the actual operation (authentication & transaction) on a database and returns an appropriate message to the agent. As mentioned earlier, we have developed the banking system over PMADE. The architecture is illustrated in Fig. 2. The Bank administrator creates new accounts and has the power to check and manipulate the user s account. The customer has to go physically to the server who incorporates this program and ask to open a new account. This module has to be hooked up with the mobile agent platform. A Graphical Interface (GUI) has been designed. The administrator uses the services of the following: New-Account module: This module helps to create an account & check and update its information. It returns a Credit Card ID and Account Holder Signature for every new account. Credit Card ID is automatically generated by the database. Account Holder Signature is generated using Hashing Algorithms (SHA-1 or MD5) and signed with DSA for checking tampering. Balance module accepts the Credit Card ID and Account Holder Signature of an existing account and returns the balance in that account from the Balance Book. The entire procedure takes place via a form. A GUI has also been provided so that a customer, who has failed to submit a mobile agent, can himself/herself do a transaction. Credit and Debit modules: These modules perform the actual credit/debit into the account. All the above modules display appropriate messages after each operation, informing either successful transaction execution or stating reasons for failure. A GUI, with a Help facility, has been designed for ease of use of these modules. 2
3 The Bank Server has two stationary agents called the Credit Stationary Agent and Debit Stationary Agent, which provide second level security to the bank account is opened in the bank. It is searched by either Credit Card ID or by Account Holder Signature fields. Both can be considered as primary keys to this table Graphical Panel C lient E nd To Agent Submitter Interface PM ADE Server Bank Server System Administrator Bank Database Fig. 2. Architecture of the Banking System database after the authentication by PMADE itself. A mobile agent uses the services of these modules to perform the required transactions by furnishing the required parameters to them. Mobile agents do not themselves fetch, search or update the bank database. This is done for enhancing the security of the system and prevents an authorized customer from creating a malicious agent who can manipulate his/her account. The stationary agents perform the actual transaction and inform the mobile agents whether the transaction was successfully completed or reasons for its failure. 3.2 Distributed Database A distributed database [11] is required to hold all the data pertaining to the banking system, like details of customers, transactions completed, accounts, etc. It may be distributed by fragmentation, or replication, or both. The designed application supports all three types of distributed databases and uses a relational database model. All the updates are made in parallel in all parts of the database. Once a database is opened by an entity (mobile agent), no one else can access it (for updates, but reading is permissible) until this entity has released the database. Thus at any time, the database is under control of only one mobile agent. This feature supports concurrency control in the database. Deadlocks are avoided by making all operations independent of others and having a single control on the database. No cyclic dependency occurs and no roll back is required. The mobile agent may be terminated if it stays for a long period on the server or it may itself migrate to another server if it does not get access to the databases. The following tables are used in the database: Ledger Book: which contains information about every account holder. An entry is made in it whenever a new separately. These are generated automatically by the Bank Administrator whenever a new entry is made. A Mobile agent is checked for authentication by these fields before it is forwarded for further operation. Balance Book: has an entry for each account holder and contains information about the present balance in it. It is searched and updated by its two fields jointly, i.e., Credit Card ID and Account Holder Signature, each one is primary key to this table. It is updated whenever a transaction takes place, after authentication from the Ledger Book. Credit and Debit Books: Credit and Debit books are used to generate reports of all the transactions that the customer has made. An entry is made for every credit/debit transaction here. It is important to note that the database is opened in read only mode, since an agent may be required to find only the balance in an account. For e.g., a seller wanting to check if a potential customer has sufficient funds or not. 4 Implementation The application is developed in JAVA 2 version 1.2. PMADE is used as the mobile agent platform. All programming is done in Windows 9x/NT environment. (a) Design of Database: The database is made in MS Access 97 and the driver used to run this database is Microsoft Access Driver of ODBC (Object Database Connectivity). JAVA has its own database driver called JDBC (Java Database Connectivity). The interface between these two has been provided by JDBC-ODBC Protocol. All queries are made in SQL (Structured Query Language). 3
4 (b) Integration with the PMADE: s can interact with PMADE by developing agent application programs. In PMADE infrastructure, agent application programs are implemented as Java objects. s would first need to write a Java class that specifies some action, such as accessing a database on a remote node. Once this Java class is written and compiled, the user can launch the agent program in three ways: (1) via a GUI Agent Launch Wizard, (2) via a command line tool, or (3) using the external API (Agent Programming Interface). The first two mechanisms are provided with PMADE, while the last one requires the user to write a customized launch class, which makes use of the PMADE class libraries. (c) Mobile Agents A single agent is sufficient for performing the same task on different banks. When the agent reaches an Agent Host, it makes clones of itself and sends them to all the places where a bank server is running. Hence all the databases, where the customers account exists, are updated simultaneously, allowing concurrent execution. This feature makes handling of a distributed database possible. Three mobile agents are used in the Banking System. Every mobile agent implements Agent abstract class, this class provides property to an agent by which PMADE recognize it. The agent BFindAgent gets the balance in the customer s account. It carries information (customer name, customer ID and customer signature) about the Customer, for accessing its account. Agent AgentDebit debits from customer s account. When it reaches the agent host, it calls the AuthenticatorDebit stationary agent, which provides the actual operation to be performed on the database. It carries the information: customer name, customer ID, customer signature and amount. Similarly agent AgentCredit credits into a customer s account. When it reaches the agent host it calls the AuthenticatorCredit stationary agent which facilitates for performing actual operation on the database. It carries the information: customer name, customer ID, customer signature, Cheque/DD/No, Cheque/DD Date, Paying bank name and amount on the cheque/dd. user of this host is accepted. Due to this reason, propagation and authentication time is large in this case, because an acknowledgement information is required to be sent to the host (agent launcher host). This model is used when a customer/supplier wants to check the current balance in the account of a customer who wants to purchase/deliver some commodity from/to supplier/customer. It does not increase traffic on the network as only a single copy of the agent travels on the network. Table 1. Single agent migrating from node to node on Started from Agent Submitter Departed at Returned at Server IP Arrival to start processing database to leave database to depart Propagation/ Authentication Case 2: Parallel operation by cloned agents. Table 2 shows the movement of agent from an agent submitter to the parent agent host (this is host where the agent was first submitted). PMADE authentication (first level security) is done at this host only as it is treated as the master node for creating and controlling the clones. After authentication at the parent host, clones of the agent are created and launched to remote agent hosts. These clones work in parallel and after completion of the task at remote agent hosts, they are required to report at the parent host. When all the clones have returned to the parent host, the Cloning compiles the result and sends it to the Agent Reply, from where it reaches the agent launcher. This table shows a propagation/ authentication time of , which is very small in comparison to , of Table 1. Table 2 shows the cloned agent working at the database at the same time, i.e., the database is updated in parallel, as mentioned in section 3.2. This model is used for credit and debit operations. Table 2. Clones of an agent working in parallel on different nodes on Started from Agent Submitter Departed at Return at Server IP Arrival to start processing database to leave database to depart Propagation/ Authentication Discussion of Results We have tested our banking system on a 4-node network for two cases results of which are shown by Tables 1 and 2. Case 1: Serial itinerary with PMADE authentication [12, 13, 14, 15] at every host. Table 1 shows the movement of an agent from node to node. We have launched an agent and provided it a set of Agent Hosts ( nodes) where it has to do work. The agent is authenticated by PMADE at every host before accepting it. The agent comes from a client who is an authorized Note: is represented as hh:min:sec:millsec. We have tested on small amounts of data. When data is large, propagation and authentication time may be considered negligible. Both the cases can be used for finding customers account balance information or for credit/debit in the customer s account. 6 Conclusion This paper has reported on the implementation and results of a banking system based on mobile agents. 4
5 Security of the system from mobile agents has been incorporated at two levels. At the first level we authenticate mobile agents at the Agent Host. This is done by PMADE At the second level, the customer is authenticated by the stationary agents. The banking system has been implemented and tested over the Internet in the laboratory. In this paper we have reported only the Banking System part of an E-commerce system. Currently we are in the process of implementing a buyers/suppliers system. Agents are dispatched by the buyer to various suppliers, where they negotiate orders and deliveries, returning to the buyer with their best deals for approval. It is possible to have a deep supply chain, where a supplier may need to contact further suppliers of sub components in order to respond to an entry. Further, the application designed here is based on the pull model, in which the client s mobile agent visits the bank server. A different system, based on the push model, in which the bank s mobile agent regularly visits the client, is also being tried. Performance improves in this case as security checks can be bypassed. Also the bank can regularly advertise new schemes. It can also warn a client when he/she is low on credit (balance) etc, using its own agents. This is under consideration. References [1] Prithaviraj Dasgupta, Nitya Narasimhan, Louse E.Moser, MAgNET: Mobile Agents for ed Electronics Trading, IEEE Transaction On knowledge and data engineering, vol. 11, no. 4, July/Aug [2] Menelaos K. Perdikeas Fotis Chatzipapadopoulos and Lakovos S. Venieris, An Evaluation Study of mobile agent Technology: Standardization, Implementation and Evolution, IEEE, 1999, /99, pp [3] Agrawal, N., A Distributed Banking System Using Mobile Agents: An Approach for E-commerce, Masters Thesis Department of Electronics & Computer Engineering, IIT Roorkee, India, Feb [4] Patel, R.B. and Garg, K. A Mobile Agent Framework for Parallel & Distributed Computing (PMADE), A Technical Report [5] Patel R.B. and Garg Kumkum, PMADE A Platform for mobile agent Distribution & Execution, in the Proceedings of 5 th World MultiConference on Systemics, Cybernetics and Informatics (SCI2001) and 7 th International Conference on Information System Analysis and Synthesis (ISAS 2001), Orlando, Florida, USA, July 22-25, 2001, Vol. IV, pp [6] Patel R.B. and Garg Kumkum, Mobile Agent Management in PMADE, in Proceeding of ADCOM 2001, 9 th International conference on Advanced Computing and Communications, Bhubaneshwar, India, Dec , [7] Patel, R.B. and Garg, K., Communication Mechanisms for mobile agents, in Proceedings of First International ICSC Congress on AUTONOMOUS INTELLIGENT SYSTEMS, Deakin University Waterfront Campus, Geelong Australia, Feb , [8] Fünfrocken S., Migration of Java-based Mobile Agents - Capturing and Reestablishing the State of Java Programs, MA 98: Proceedings 2nd International Workshop on Mobile Agents, [9] Hyacinth S. Nwana Software Agents: An Overview, Knowledge Engineering Review, Vol. 11, No. 3, pp. 1-40, Sept. 1996, Cambridge University Press, [10] Azarmi Nader, Thint Marcus and Ohtani Takeshi, Enhancing E-Communities with Agent-Based Systems, IEEE Computer, pp , July [11] Jonathan Dale, A Mobile Agent Architecture for Distributed Information Management, Ph.D. thesis, 1997, [12] Wayne Jansen and Tom Karygiannis, NIST Special Publication Mobile Agent Security National Institute of Standards and Technology, Computer Security Division, Gaithersburg, MD [13] Nayeem Islam, et al., A Flexible Security System for Using Internet Content, IEEE Software, Sept. 1997, pp [14] Patel, R.B. and Garg, K., A Security Framework for Mobile Agent Systems, in Proceedings of 6 th International Conference on Business Information Systems (BIS 2003), Colorado, Spring, USA, June 4-6, 2003, pp [15] Patel, R.B. and Garg, K., Providing Security and Robustness to Mobile Agents on Open s, in Proceedings of 6 th International Conference on Business Information Systems (BIS 2003), Colorado, Spring, USA, June 4-6, 2003, pp (Received, Best Paper Award). 5
Hybrid Approach of Client-Server Model and Mobile Agent Technology to Drive an E-Commerce Application
Hybrid Approach of Client-Server Model and Mobile Agent Technology to Drive an E-Commerce Application Ajab Maheshwari PG Scholar, IT Dept, IET-DAVV, Indore (M.P.), India. Dr. Pratosh Bansal Associate Professor,
More informationADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS
ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS
More informationKeywords: mobile agents, supply chain management, industrial application.
A Shipment Tracking System using Wireless technology and Mobile agents Mei-Ling L. Liu, Alfredo Macias, Thuan Ngo Computer Science Department, California Polytechnic State University, San Luis Obispo mliu@csc.calpoly.edu
More informationTrust Model for Hybrid Security Architecture Based on Reputation for Secure Execution of Mobile Agents
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 1 (2014), pp. 67-72 International Research Publications House http://www. irphouse.com /ijict.htm Trust
More informationA Study of Application Recovery in Mobile Environment Using Log Management Scheme
A Study of Application Recovery in Mobile Environment Using Log Management Scheme A.Ashok, Harikrishnan.N, Thangavelu.V, ashokannadurai@gmail.com, hariever4it@gmail.com,thangavelc@gmail.com, Bit Campus,
More informationCHAPTER 1: OPERATING SYSTEM FUNDAMENTALS
CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS What is an operating? A collection of software modules to assist programmers in enhancing efficiency, flexibility, and robustness An Extended Machine from the users
More informationA Scheme for Implementing Load Balancing of Web Server
Journal of Information & Computational Science 7: 3 (2010) 759 765 Available at http://www.joics.com A Scheme for Implementing Load Balancing of Web Server Jianwu Wu School of Politics and Law and Public
More informationAn Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents
An Intelligent Approach for Integrity of Heterogeneous and Distributed Databases Systems based on Mobile Agents M. Anber and O. Badawy Department of Computer Engineering, Arab Academy for Science and Technology
More informationA NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS K.B.Chandradeep Department of Centre for Educational Technology, IIT Kharagpur, Kharagpur, India kbchandradeep@gmail.com ABSTRACT This paper
More informationSelf-organized Multi-agent System for Service Management in the Next Generation Networks
PROCEEDINGS OF THE WORKSHOP ON APPLICATIONS OF SOFTWARE AGENTS ISBN 978-86-7031-188-6, pp. 18-24, 2011 Self-organized Multi-agent System for Service Management in the Next Generation Networks Mario Kusek
More informationA STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS
A STUDY OF THE BEHAVIOUR OF THE MOBILE AGENT IN THE NETWORK MANAGEMENT SYSTEMS Tarag Fahad, Sufian Yousef & Caroline Strange School of Design and Communication Systems, Anglia Polytechnic University Victoria
More informationAdvanced Peer to Peer Discovery and Interaction Framework
Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering
More informationCHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT
81 CHAPTER 5 WLDMA: A NEW LOAD BALANCING STRATEGY FOR WAN ENVIRONMENT 5.1 INTRODUCTION Distributed Web servers on the Internet require high scalability and availability to provide efficient services to
More informationInformation integration platform for CIMS. Chan, FTS; Zhang, J; Lau, HCW; Ning, A
Title Information integration platform for CIMS Author(s) Chan, FTS; Zhang, J; Lau, HCW; Ning, A Citation IEEE International Conference on Management of Innovation and Technology Proceedings, Singapore,
More informationE-commerce refers to paperless exchange of business information using following ways.
E-Commerce E-Commerce or Electronics Commerce is a methodology of modern business which fulfills the need of business organizations, vendors and customers to reduce cost and improve the quality of goods
More informationE-Commerce Supply Chain Management Domain Research and Standard Architectures Kunal Chopra, Jeff Elrod, Bill Glenn, Barry Jones.
E-Commerce Supply Chain Management Domain Research and Standard Architectures Kunal Chopra, Jeff Elrod, Bill Glenn, Barry Jones Introduction E-Commerce Supply Chain Management involves the co-ordination
More informationEMS. Trap Collection Active Alarm Alarms sent by E-mail & SMS. Location, status and serial numbers of all assets can be managed and exported
EMS SmartView TM Superior Design with Real-Time Monitor and Control Trap Collection Active Alarm Alarms sent by E-mail & SMS Network Topology Network Element Discovery Network Element Configuration Location,
More informationEFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT
EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT 1 R.Sivaraman, 2 RM.Chandrasekaran 1 Dy.Director, Center for Convergence of Technologies (CCT), Anna University Tiruchirappalli, Tiruchirappalli,
More informationProduct Overview. Contents
Contents Product Overview Copyright 2002 - Xware AB. All rights reserved. xtrade is a registered trademark of Xware AB. Symphonia is a trademark of Orion Systems New Zealand Ltd. All rights reserved. 2
More informationInformation and Communications Technology Courses at a Glance
Information and Communications Technology Courses at a Glance Level 1 Courses ICT121 Introduction to Computer Systems Architecture This is an introductory course on the architecture of modern computer
More informationArchitecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent
Architecture for Intrusion Detection System with Fault Tolerance Using Mobile Agent Chintan Bhatt 1, Asha Koshti 2,Hemant Agrawal 3, Zakiya Malek 4, Dr Bhushan Trivedi 5 MCA Dept.,GLS Institute of Computer
More informationKeywords: Dynamic Load Balancing, Process Migration, Load Indices, Threshold Level, Response Time, Process Age.
Volume 3, Issue 10, October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Load Measurement
More informationResearch on Mobile Agent-based E-Commerce System Framework
440 Research on Mobile -based E-Commerce System Framework Wenna Liu 1, Deli Yang 2 School of Management, Dalian University of Technology, Dalian 116024, China 1 wenal@sina.com, 2 somdyang@dlut.edu.cn ABSTRACT
More informationDigital Watermark Mobile Agents *
Digital Watermark Mobile Agents * Jian Zhao and Chenghui Luo Fraunhofer Center for Research in Computer Graphics, Inc. 321 South Main Street Providence, RI 02903 Abstract Digital watermarking has emerged
More informationDigital Watermark Mobile Agents
In: Proc. of the 22 nd National Information System Security Conference Hyatt Regency, Crystal City, VA October 18-21, 1999 Digital Watermark Mobile Agents Jian Zhao and Chenghui Luo Fraunhofer Center for
More informationREMOTE CONTROL OF REAL EXPERIMENTS VIA INTERNET
REMOTE CONTROL OF REAL EXPERIMENTS VIA INTERNET Carine Campos Teixeira, carinect@ita.br Jeeves Lopes dos Santos, jeeves@ita.br Cairo Lúcio Nascimento Júnior, cairo@ita.br Instituto Tecnológico de Aeronáutica,
More informationThe 8th International Conference on e-business (inceb2009) October 28th-30th, 2009
A STUDY ON THE REQUIREMENTS AND TOOLS FOR REAL TIME FLEET MANAGEMENT E-BUSINESS SYSTEMS IN THAILAND Sirilak Borirug 1, Chun Che Fung 2, Wudhijaya Philuek 3 School of Information Technology, Murdoch University
More informationAn Architecture Model of Sensor Information System Based on Cloud Computing
An Architecture Model of Sensor Information System Based on Cloud Computing Pengfei You, Yuxing Peng National Key Laboratory for Parallel and Distributed Processing, School of Computer Science, National
More informationA Generic Model for Querying Multiple Databases in a Distributed Environment Using JDBC and an Uniform Interface
A Generic Model for Querying Multiple Databases in a Distributed Environment Using JDBC and an Uniform Interface Barkha Bhagwant Keni, M.Madiajagan, B.Vijayakumar Abstract - This paper discusses about
More informationDISTRIBUTED AND PARALLELL DATABASE
DISTRIBUTED AND PARALLELL DATABASE SYSTEMS Tore Risch Uppsala Database Laboratory Department of Information Technology Uppsala University Sweden http://user.it.uu.se/~torer PAGE 1 What is a Distributed
More informationMobile Wallet Platform. Next generation mobile wallet solution
Mobile Wallet Platform Next generation mobile wallet solution Introduction to mwallet / Mobile Wallet Mobile Wallet Account is just like a Bank Account User s money lies with the Mobile Wallet Operator
More informationMobile Software Agents: an Overview
Mobile Software Agents: an Overview Authors : From: Vu Anh Pham and Ahmed Karmouch University of Ottawa, Ontario Presented by: Luba Sakharuk Agenda for the Overview of Mobile Agents Abstract The Mobile
More informationAn Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems
More informationA Grid Architecture for Manufacturing Database System
Database Systems Journal vol. II, no. 2/2011 23 A Grid Architecture for Manufacturing Database System Laurentiu CIOVICĂ, Constantin Daniel AVRAM Economic Informatics Department, Academy of Economic Studies
More informationFioranoMQ 9. High Availability Guide
FioranoMQ 9 High Availability Guide Copyright (c) 1999-2008, Fiorano Software Technologies Pvt. Ltd., Copyright (c) 2008-2009, Fiorano Software Pty. Ltd. All rights reserved. This software is the confidential
More informationA Survey Study on Monitoring Service for Grid
A Survey Study on Monitoring Service for Grid Erkang You erkyou@indiana.edu ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide
More informationP2P VoIP for Today s Premium Voice Service 1
1 P2P VoIP for Today s Premium Voice Service 1 Ayaskant Rath, Stevan Leiden, Yong Liu, Shivendra S. Panwar, Keith W. Ross ARath01@students.poly.edu, {YongLiu, Panwar, Ross}@poly.edu, Steve.Leiden@verizon.com
More informationENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION
ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION Arto Hämäläinen and Jari Porras Lappeenranta University of Technology Laboratory of Communications Engineering P.O. Box 20 53851
More informationA Semantic Marketplace of Peers Hosting Negotiating Intelligent Agents
A Semantic Marketplace of Peers Hosting Negotiating Intelligent Agents Theodore Patkos and Dimitris Plexousakis Institute of Computer Science, FO.R.T.H. Vassilika Vouton, P.O. Box 1385, GR 71110 Heraklion,
More informationInternational Journal of Enterprise Computing and Business Systems ISSN (Online) : 2230-8849
WINDOWS-BASED APPLICATION AWARE NETWORK INTERCEPTOR Ms. Shalvi Dave [1], Mr. Jimit Mahadevia [2], Prof. Bhushan Trivedi [3] [1] Asst.Prof., MCA Department, IITE, Ahmedabad, INDIA [2] Chief Architect, Elitecore
More informationReal-time Data Replication
Real-time Data Replication from Oracle to other databases using DataCurrents WHITEPAPER Contents Data Replication Concepts... 2 Real time Data Replication... 3 Heterogeneous Data Replication... 4 Different
More informationIntelligent Shopping Agent
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-3 E-ISSN: 2347-2693 Intelligent Shopping Agent Sameer Shanbhag 1*, Sujith Nair 2 and Nikhil Nair3 1*,2,3
More informationPurpose... 3. Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations... 7. Data Encryption...
Contents Purpose... 3 Background on Keyscan Software... 3 Client... 4 Communication Service... 4 SQL Server 2012 Express... 4 Aurora Optional Software Modules... 5 Computer Hardware Configurations... 6
More informationThis paper was presented at the 1996 CAUSE annual conference. It is part of the proceedings of that conference, "Broadening Our Horizons:
This paper was presented at the 1996 CAUSE annual conference. It is part of the proceedings of that conference, "Broadening Our Horizons: Information, Services, Technology -- Proceedings of the 1996 CAUSE
More informationScheduling Allowance Adaptability in Load Balancing technique for Distributed Systems
Scheduling Allowance Adaptability in Load Balancing technique for Distributed Systems G.Rajina #1, P.Nagaraju #2 #1 M.Tech, Computer Science Engineering, TallaPadmavathi Engineering College, Warangal,
More informationSecure Network Monitoring System using Mobile Agent
1 Secure Network Monitoring System using Mobile Agent G. M. Gaikwad 1, A. M. Kanthe 2, M. S. Chaudhari 3 1,2,3 Department of Computer Engg. Sinhgad Institute of Technology, Lonavala (India) 1 gmgaikwad@gmail.com
More informationWhy MCL-Bridge for SAP
Why MCL-Bridge for SAP Visualize mobilized SAP R/3 Realize MCL-Bridge for SAP Why MCL-Bridge for SAP Does SAP R/3 drive your shop-floor operations retail, warehouse, distribution, manufacturing, or transportation
More informationPublic Cloud Partition Balancing and the Game Theory
Statistics Analysis for Cloud Partitioning using Load Balancing Model in Public Cloud V. DIVYASRI 1, M.THANIGAVEL 2, T. SUJILATHA 3 1, 2 M. Tech (CSE) GKCE, SULLURPETA, INDIA v.sridivya91@gmail.com thaniga10.m@gmail.com
More informationNetwork Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper
WP2 Subject: with the CRYPTO-BOX Version: Smarx OS PPK 5.90 and higher 0-15Apr014ks(WP02_Network).odt Last Update: 28 April 2014 Target Operating Systems: Windows 8/7/Vista (32 & 64 bit), XP, Linux, OS
More informationLogical Data Models for Cloud Computing Architectures
Logical Data Models for Cloud Computing Architectures Augustine (Gus) Samba, Kent State University Describing generic logical data models for two existing cloud computing architectures, the author helps
More informationFair Scheduling Algorithm with Dynamic Load Balancing Using In Grid Computing
Research Inventy: International Journal Of Engineering And Science Vol.2, Issue 10 (April 2013), Pp 53-57 Issn(e): 2278-4721, Issn(p):2319-6483, Www.Researchinventy.Com Fair Scheduling Algorithm with Dynamic
More informationOnline Trading and Negotiation
Online Trading and Negotiation Instructor: Jerry Gao Ph.D. San Jose State University email: jerrygao@email.sjsu.edu URL: http://www.engr.sjsu.edu/gaojerry May, 2000 Outline - Introduction of Trading -
More informationEnduraData Cross Platform File Replication and Content Distribution (November 2010) A. A. El Haddi, Member IEEE, Zack Baani, MSU University
1 EnduraData Cross Platform File Replication and Content Distribution (November 2010) A. A. El Haddi, Member IEEE, Zack Baani, MSU University Abstract In this document, we explain the various configurations
More informationLIVE VIDEO STREAMING USING ANDROID
LIVE VIDEO STREAMING USING ANDROID Dharini Chhajed 1, Shivani Rajput 2 and Sneha Kumari 3 1,2,3 Department of Electronics Engineering, Padmashree Dr. D. Y. Patil Institute of Engineering and Technology,
More informationchapater 7 : Distributed Database Management Systems
chapater 7 : Distributed Database Management Systems Distributed Database Management System When an organization is geographically dispersed, it may choose to store its databases on a central database
More informationERICSSON SOLIDUS ecare AGENT, MANAGEMENT AND SELF-SERVICE APPLICATIONS BUILT FOR BETTER BUSINESS
ERICSSON SOLIDUS ecare AGENT, MANAGEMENT AND SELF-SERVICE APPLICATIONS BUILT FOR BETTER BUSINESS Ericsson Solidus ecare multimedia contact center is intelligently built on three fundamental groups of powerful
More informationCloud Computing for Agent-based Traffic Management Systems
Cloud Computing for Agent-based Traffic Management Systems Manoj A Patil Asst.Prof. IT Dept. Khyamling A Parane Asst.Prof. CSE Dept. D. Rajesh Asst.Prof. IT Dept. ABSTRACT Increased traffic congestion
More informationANALYSIS OF THE WEB, PROCESSOR SPEED AND BANDWIDTH GROWTH: IMPACT ON SEARCH ENGINE DESIGN
ANALYSIS OF THE WEB, PROCESSOR SPEED AND BANDWIDTH GROWTH: IMPACT ON SEARCH ENGINE DESIGN K. Satya Sai Prakash Network Systems Laboratory IIT Madras, Chennai - 636 India Phone: 91-44-22578355 ssai@acm.org
More informationJob Costing for SAP Business One Functionality Set. Reporting Library, Report Writer and Query Based Reporting
One One An embedded cost management solution for all projects and activities across your enterprise. Prepare estimates and quotations, track labor, materials, purchases and resource usage against jobs,
More informationBlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2 Feature and Technical Overview Published: 2010-06-16 SWDT305802-1108946-0615123042-001 Contents 1 Overview: BlackBerry Enterprise
More informationData Integrity for Secure Dynamic Cloud Storage System Using TPA
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 7-12 International Research Publication House http://www.irphouse.com Data Integrity for Secure
More informationSCADA Questions and Answers
SCADA Questions and Answers By Dr. Jay Park SCADA System Evaluation Questions Revision 4, October 1, 2007 Table of Contents SCADA System Evaluation Questions... 1 Revision 4, October 1, 2007... 1 Architecture...
More informationDesign and Implementation of Distributed Process Execution Environment
Design and Implementation of Distributed Process Execution Environment Project Report Phase 3 By Bhagyalaxmi Bethala Hemali Majithia Shamit Patel Problem Definition: In this project, we will design and
More informationA SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS. N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1
A SECURITY ARCHITECTURE FOR AGENT-BASED MOBILE SYSTEMS N. Borselius 1, N. Hur 1, M. Kaprynski 2 and C.J. Mitchell 1 1 Royal Holloway, University of London 2 University of Strathclyde ABSTRACT Future mobile
More information2. Accessing Databases via the Web
Supporting Web-Based Database Application Development Quan Xia 1 Ling Feng 2 Hongjun Lu 3 1 National University of Singapore, Singapore, xiaquan@comp.nus.edu.sg 2 Hong Kong Polytechnic University, China,
More informationSymantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
More informationRetailer Operating Manual for e-books
Retailer Operating Manual for e-books Wholesale Distribution and Fulfillment Services Volume 1.1a Ingram Content Group, through its CoreSource and Lightning Source (LSI) companies, provides content fulfillment
More informationJournal of Electronic Banking Systems
Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative
More informationDeployment Pattern. Youngsu Son 1,JiwonKim 2, DongukKim 3, Jinho Jang 4
Deployment Pattern Youngsu Son 1,JiwonKim 2, DongukKim 3, Jinho Jang 4 Samsung Electronics 1,2,3, Hanyang University 4 alroad.son 1, jiwon.ss.kim 2, dude.kim 3 @samsung.net, undersense3538@gmail.com 4
More informationEnhancing A Software Testing Tool to Validate the Web Services
Enhancing A Software Testing Tool to Validate the Web Services Tanuj Wala 1, Aman Kumar Sharma 2 1 Research Scholar, Department of Computer Science, Himachal Pradesh University Shimla, India 2 Associate
More informationPipeline Orchestration for Test Automation using Extended Buildbot Architecture
Pipeline Orchestration for Test Automation using Extended Buildbot Architecture Sushant G.Gaikwad Department of Computer Science and engineering, Walchand College of Engineering, Sangli, India. M.A.Shah
More informationComputer System Management: Hosting Servers, Miscellaneous
Computer System Management: Hosting Servers, Miscellaneous Amarjeet Singh October 22, 2012 Partly adopted from Computer System Management Slides by Navpreet Singh Logistics Any doubts on project/hypo explanation
More informationEvent-based middleware services
3 Event-based middleware services The term event service has different definitions. In general, an event service connects producers of information and interested consumers. The service acquires events
More informationBanking Security using Honeypot
Banking Security using Honeypot Sandeep Chaware D.J.Sanghvi College of Engineering, Mumbai smchaware@gmail.com Abstract New threats are constantly emerging to the security of organization s information
More informationVolume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com Image
More informationThe Service Availability Forum Specification for High Availability Middleware
The Availability Forum Specification for High Availability Middleware Timo Jokiaho, Fred Herrmann, Dave Penkler, Manfred Reitenspiess, Louise Moser Availability Forum Timo.Jokiaho@nokia.com, Frederic.Herrmann@sun.com,
More informationSimplifying Data Data Center Center Network Management Leveraging SDN SDN
Feb 2014, HAPPIEST MINDS TECHNOLOGIES March 2014, HAPPIEST MINDS TECHNOLOGIES Simplifying Data Data Center Center Network Management Leveraging SDN SDN Author Author Srinivas Srinivas Jakkam Jakkam Shivaji
More informationConfiguring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
More informationThe Implementation of Signing e-document by Using the Wireless Identity Module in Cellular Phone
832 The Fourth International Conference on Electronic Business (ICEB2004) / Beijing The Implementation of Signing e-document by Using the Wireless Identity Module in Cellular Phone Chengyuan Ku *, Yenfang
More informationLoad Balancing and Maintaining the Qos on Cloud Partitioning For the Public Cloud
Load Balancing and Maintaining the Qos on Cloud Partitioning For the Public Cloud 1 S.Karthika, 2 T.Lavanya, 3 G.Gokila, 4 A.Arunraja 5 S.Sarumathi, 6 S.Saravanakumar, 7 A.Gokilavani 1,2,3,4 Student, Department
More information5nine Security for Hyper-V Datacenter Edition. Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager
5nine Security for Hyper-V Datacenter Edition Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager November 2013 11 Table of Contents Summary... 5 System requirements... 5 Permissions...
More informationGrid Computing Approach for Dynamic Load Balancing
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-1 E-ISSN: 2347-2693 Grid Computing Approach for Dynamic Load Balancing Kapil B. Morey 1*, Sachin B. Jadhav
More informationQuantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
More informationDesign Patterns for Managing Product Lifecycle Information
Design Patterns for Managing Product Lifecycle Information Introduction Kary Främling, Timo Ala-Risku, Mikko Kärkkäinen, Jan Holmström The increasing demands on product lifecycle management means that
More informationA Review on Cloud Data Storage in Virtual Perspective
A Review on Cloud Data Storage in Virtual Perspective B.Nagarajan #1, Dr.J.Suguna *2 # Ph.D., Research Scholar, Research and Development Centre, Bharathiar University, Coimbatore-621046, India. * Associate
More informationFramework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
More informationInterwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
More informationPerformance Counters. Microsoft SQL. Technical Data Sheet. Overview:
Performance Counters Technical Data Sheet Microsoft SQL Overview: Key Features and Benefits: Key Definitions: Performance counters are used by the Operations Management Architecture (OMA) to collect data
More informationDB2 Connect for NT and the Microsoft Windows NT Load Balancing Service
DB2 Connect for NT and the Microsoft Windows NT Load Balancing Service Achieving Scalability and High Availability Abstract DB2 Connect Enterprise Edition for Windows NT provides fast and robust connectivity
More informationOverview - Snort Intrusion Detection System in Cloud Environment
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 3 (2014), pp. 329-334 International Research Publications House http://www. irphouse.com /ijict.htm Overview
More informationAnalysis of E-Commerce Security Protocols SSL and SET
Analysis of E-Commerce Security Protocols SSL and SET Neetu Kawatra, Vijay Kumar Dept. of Computer Science Guru Nanak Khalsa College Karnal India ABSTRACT Today is the era of information technology. E-commerce
More informationSoftware Requirement Specification For Flea Market System
Software Requirement Specification For Flea Market System By Ilya Verlinsky, Alexander Sarkisyan, Ambartsum Keshishyan, Igor Gleyser, Andrey Ishuninov 1 INTRODUCTION 1.1 Purpose 1.1.1 Purpose of SRS document
More informationA guide to CLARiSUITE TM network solutions
Technical FAQ s CLARiSUITE Code Assurance A guide to CLARiSUITE TM network solutions Overview IT infrastructure security, integrity and stability are primary concerns of Videojet and its customers. Management
More informationFast remote data access for control of TCP/IP network using android Mobile device
RESEARCH ARTICLE OPEN ACCESS Fast remote data access for control of TCP/IP network using android Mobile device Vaibhav Muddebihalkar *, R.M Gaudar** (Department of Computer Engineering, MIT AOE Alandi
More informationDesign and Implementation of an Intelligent Network Monitoring and Management Tool in Internet and Intranet
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 5, Number 2 (2012), pp. 83-89 International Research Publication House http://www.irphouse.com Design and Implementation
More information1 File Processing Systems
COMP 378 Database Systems Notes for Chapter 1 of Database System Concepts Introduction A database management system (DBMS) is a collection of data and an integrated set of programs that access that data.
More informationRequest for Proposal. Contract Management Software
Request for Proposal Contract Management Software Ogden City Information Technology Division RETURN TO: Ogden City Purchasing Agent 2549 Washington Blvd., Suite 510 Ogden, Utah 84401 Attn: Sandy Poll 1
More informationSODDA A SERVICE-ORIENTED DISTRIBUTED DATABASE ARCHITECTURE
SODDA A SERVICE-ORIENTED DISTRIBUTED DATABASE ARCHITECTURE Breno Mansur Rabelo Centro EData Universidade do Estado de Minas Gerais, Belo Horizonte, MG, Brazil breno.mansur@uemg.br Clodoveu Augusto Davis
More informationOffline Data Synchronization in Order Management System
Offline Data Synchronization in Order Management System Abstract: We live in an increasingly connected world. However, in many cases we cannot rely on connectivity 100 percent of the time. Your users may
More informationExperiments in Collaborative Cloud-based Distance Learning
Experiments in Collaborative Cloud-based Distance Learning Aleksandar Karadimce, Danco Davcev Faculty of Computer Science and Engineering, University Ss Cyril and Methodius Skopje, R. Macedonia akaradimce@ieee.org,
More information